C2150-618 IBM Security Privileged Identity Manager V2.0.2 Deployment

Posted by:admin Posted on:Sep 29,2017

Test information:
Number of questions: 60
Time allowed in minutes: 90
Required passing score: 61%
Languages: English

Related certifications:
IBM Certified Deployment Professional – Security Privileged Identity Manager V2.0.2

The test consists of 5 sections containing a total of approximately 60 multiple-choice questions. The percentages after each section title reflect the approximate distribution of the total question set across the sections.

Section 1 – Planning (20%)
Illustrate the key benefits of the privileged identity management.
Analyze the client and business requirements and translate into implementation goals (i.e. optional features, end resources, target system, adapters and access profile, ISPIM agent OS, ISPIM for Applications, auditing, reporting requirements, activity monitoring).
Produce an implementation plan (i.e. credential access methods, additional checkout assurance, reauthentication, etc.).
Determine goal customization (i.e. approval and lifecycle rules, identify shared access management, integration with existing processes, etc.).
Produce deployment topologies for business requirements (i.e. scale, size, availability, automation, redundancy, prerequisites, form factor, components, hardware and software, network architecture, upported platforms, etc.).

Section 2 – Installation and Configuration (18%)
Perform the database and directory installation and configuration (i.e. update fixpack, LDAP over SSL, etc.).
Complete the provisioning, installation and configuration of the ISPIM virtual appliance.
Perform guided and advanced configurations (i.e. cluster node setup, load balancer integration, configuration parameters, Application Identity management, secure communications, etc.).
Perform the installation and configuration of optional components (i.e. Cognos reporting server, external TDI servers, external AD registry, custom root certificate, SSL, etc.).
Perform the installation and configuration of AccessAgent on workstations, terminal server and Citrix server and desktops. (i.e. ISPIM Root CA certificate, Access Studio tool).

Section 3 – Administration (22%)
Describe how to create administrative domains, administrators, users, auditors, application managers.
Construct custom groups, views and processes (i.e. identity feeds, delegate administration, forms and workflow, etc.).
Demonstrate onboarding credentials (i.e. manual and bulk load, credential default settings, credential pools, applications, connected v/s unconnected credential, etc.).
Construct target systems connections and determine access (i.e. resources, roles and shared access policies, password policies, target endpoint, identity providers).
Construct an automated credential check-in/check-out, session recording, and access profiles.
Manipulate reports to deliver information based on customer requirements (i.e. Cognos reports, internal audit reports).

Section 4 – Maintenance (22%)
Construct and modify AccessProfiles with ISPIM support.
Perform registration, fingerprinting, recapturing, and administration of application instances and credentials.
Perform common maintenance tasks (i.e. appliance snapshots, data tier backup, firmware upgrade mechanisms, fixpack, archive and restore session recordings, Cipher Suites, certificate uploads , cluster synchronization etc.).
Perform auditing tasks and creating audit reports (i.e. ESSO audit logs and PIM request).
Perform monitoring using URLs, tools and logs.
Analyze and present maintenance plans to meet client needs (i.e. logs, reports, Cipher Suites, certificate uploads, cluster synchronization, data synchronization, etc.).

Section 5 – Troubleshooting and Tuning (18%)
Construct a support package (i.e. access, analyze, and configure component logs and traces, PMR process, etc.).
Solve connectivity issues (i.e. between appliance and data tier, client and appliance, cluster issues, reporting modules, cluster promotion, etc.).
Show data locations and manipulate usage of data to troubleshoot problems (i.e. configure new traces for the appliance).
Examine and solve user authentication and authorization issues.
Analyze performance and make tuning changes (i.e. LDAP, DB2 and appliance).

IBM Certified Deployment Professional – Security Privileged Identity Manager V2.0.2

Job Role Description / Target Audience
This intermediate level certification is intended for deployment professionals who work with IBM Security Privileged Identity Manager V2.0.2.

These deployment professionals have extensive product experience. They plan, install, configure, administer, maintain, tune and troubleshoot IBM Security Privileged Identity Manager V2.0.2 installations.

These deployment professionals are able to perform most of the tasks involved in the job role with limited assistance.

To attain the IBM Certified Deployment Professional – Security Privileged Identity Manager V2.0.2 certification, candidates must pass 1 test. To prepare for the test, it is recommended to refer to the job role description and recommended prerequisite skills, and click the link to the test below to refer to the test objectives and the test preparation tab.

Basic knowledge of:
operating systems and databases.
hardware or virtual machines.
networking and protocols.
auditing and compliance.
information security guidelines.

This certification requires 1 test(s).

Click here to view complete Q&A of C2150-618 exam
Certkingdom Review
, Certkingdom PDF Torrents

MCTS Training, MCITP Trainnig

Best IBM C2150-618 Certification, IBM C2150-618 Training at certkingdom.com


No description.Please update your profile.

    Follow Us

    Bookmark and Share